Bring Your Own Device (BYOD) Policy

Size: px
Start display at page:

Download "Bring Your Own Device (BYOD) Policy"

Transcription

1 Bring Your Own Device (BYOD) Policy Version: 1.0 Last Amendment: N/A Approved by: Executive Committee Policy owner/sponsor: Director, Digital Library Services and CIO Policy Contact Officer: Manager, ICT Services Policy No: PD/40 TRIM File No: Date approved: 07/10/2014 Next review: 01/10/ Summary Technology is part of the everyday life of the modern public sector worker. Consumer technology is evolving quickly and is often more advanced than the technology available in the workplace. Employees increasingly prefer to use their own smart phones, tablets and other devices to access corporate information. Empowering them to do so supports greater workplace morale, mobility and flexibility. Many government agencies have adopted the use of mobile communication devices including laptops, smart phones, tablets and similar equipment as efficient business communication tools. The Office of Finance and Services have established government contracts covering the procurement and connection of mobile communication devices for government agencies. The State Library of New South Wales (the Library) has determined that the use of mobile communication technology for Library staff, contributes to the efficiency and effectiveness of staff, especially when they are remote from the Library or mobile within the premises. To ensure security of the Library s systems accessed by staff own mobile devices, ICT Services is implementing MDM (Mobile Device Management) software. MDM will be used to manage all mobile devices used to access our internal systems and ensure security of corporate data stored on the mobile devices. These procedures will define MDM requirements and roles and responsibilities of staff using their mobile devices to access the Library s internal systems. The purpose of this policy and associated BYOD procedures is to allow staff to use their own mobile devices if they wish to do so, while also ensuring they take steps to minimise the risk of unauthorised access to the Library s systems or unauthorised use or disclosure of the data held by the Library. This BYOD Policy and associated procedures have been informed by the NSW Government Mobility Solutions Framework. The Framework assists NSW Government agencies to define their agency specific mobility strategy and approach. Bring Your Own Device.docx 1/5

2 2. Policy statement This policy and associated BYOD procedures set out the terms of use for BYOD within the Library. It affects any device or accompanying media that staff may use to access the systems and data of the library, whether they are used within or outside the standard working hours. This Policy applies to all Library staff (see definition in Section 4 below) and must be read in conjunction with the BYOD procedures and other Library s policies and the Code of Conduct. 3. Legislative and Policy Framework This policy supplements the Library s Information and Technology Services Policy. You should also have regard to the following statutory rules, policy documents and standards. They provide direct or related guidance for the use of technology and the collection, storage, access, use and disclosure of data by NSW public sector agencies: Most relevant legislation Copyright Act 1968 (Cth) Crimes Act 1900 Crimes Act 1914 (Cth) Electronic Transactions Act Policy Evidence Act 1995 Government Information (Public Access) Act 2009 Government Sector Employment Act 2013 Health Records and Information Privacy Act 2002 Library Act 1939 Library Regulation 2010 Privacy and Personal Information Protection Act 1998 Public Finance and Audit Act 1983 Public Interest Disclosures Act 1994 State Records Act 1998 Workplace Surveillance Act 2005 Related and/or most relevant State Library and government policies AS/NZS ISO Risk management - Principles and guidelines AS/NZS ISO/IEC 27000:2013 Information Technology Security techniques Code of practice for information security management 2013 Code of Conduct Electronic Document Management Policy Information and Communications Technology (ICT) Services Policy M Digital Information Security Policy Mobile Technology Usage Policy NSW Government Cloud Services Policy and Guidelines NSW Government ICT Strategy NSW Government Mobility Solutions Framework 2013 NSW Government BYOD Devices Policy 2013 NSW Government Open Data Policy NSW Government Social Media Policy and Guidelines NSW Procurement: Small and Medium Enterprises Policy Framework Password Policy Bring Your Own Device.docx 2/5

3 Privacy Management Plan Records Management Policy Remote Access Policy 4. Sector Definitions and acronyms Account - Telecommunication services provider billing account. Application Computer software designed to assist end users to carry out useful tasks. Examples of applications may include the Microsoft Office suite of products or smartphone applications such as Google Maps. Bring Your Own Device (BYOD) - Any electronic device owned, leased or operated by an employee or contractor of the Library which is capable of storing data and connecting to a network, including but not limited to mobile phones, smartphones, tablets, laptops, personal computers and netbooks. Data - Any and all information stored or processed through a BYOD. Library s data refers to data owned, originating from or processed by the Library s systems. Device hygiene - BYOD must have appropriate and up-to-date hygiene solutions installed. Device hygiene includes anti-virus, anti-spam and antispyware solutions. Minimum requirements - The minimum hardware, software and general operating requirements for a BYOD. Mobile Device Management (MDM) Solution which manages, supports, secures and monitors mobile devices. Wipe A security feature that renders the data stored on a device inaccessible. Wiping may be performed locally, via an MDM product, or remotely by a network administrator Staff - all staff on the State Library payroll and all contractors, consultants, members of the Library Council of NSW, volunteers, State Library scholars and fellows. 5. Responsibilities The Director, Digital Library Services and CIO is responsible for: o ownership of the policy o assessing and acting on serious breaches of the policy requiring suspension and termination of access o tabling serious breaches of this policy to the Executive Committee The Executive Committee is accountable for: o leading the implementation of this policy including its conformity to legislative and other compliance requirements, especially those relating to the security of corporate information and protection of personal information o ensuring this policy is communicated effectively to managers, supervisors and coordinators o Reviewing serious breaches of the policy ensuring that the policy is reviewed every two years. Bring Your Own Device.docx 3/5

4 Manager, ICT Services is responsible for: o implementing procedures to ensure auditing of ICT infrastructure and systems security complies with this policy and other Library and ICT policies o Ensuring breaches are escalated to the Director, Digital Library Services and CIO promptly for assessment and possible further action. Division Directors are responsible for: o ensuring there is ongoing and effective communication of this policy to all staff o ensuring all reports of breaches of the policy are raised as soon as possible with the ICT Service Desk. Managers and supervisors are accountable for: o ensuring there is ongoing and effective communication of this policy to all staff o ensuring all reports of breaches of the policy are raised as soon as possible with their Executive member o ensuring the Privacy Contact Officer is informed of any breach of privacy o ensuring feedback on the implementation of the policy is communicated to the ICT Service Desk. ICT Services Branch staff are accountable for: o ensuring the policy is followed when working with: personal user account creation and deletion restricted group account creation and deletion. o ensuring the policy is followed when assisting State Library staff accessing the internal network and ICT services o revalidating ICT network and systems access privileges for State Library staff and third-party vendors on a yearly basis. The Privacy Contact Officer is responsible for: o managing privacy issues and applications for internal review, which may result from a breach of this policy, in accordance with the State Library s Privacy Management Plan. State Library staff are responsible for: o understanding and complying with this policy o ensuring that records created as a result of compliance with this policy are managed in accordance with the Records Management Policy. 6. BYOD Procedures Staff must review and accept BYOD Policy with associated procedures before using their own mobile devices to access the Library s internal systems. The agreement to the requirements of this policy is indicated by staff signature/acceptance of the BYOD Acceptance Form (BYOD Procedures - Appendix B). 7. Privacy The State Library is required to comply with the Privacy and Personal Information Protection Act 1998 (NSW) and the Health Records and Information Privacy Act 2002 (NSW) both of which contain Principles that the Library must abide by when it collects, stores, uses and discloses personal or health information. Bring Your Own Device.docx 4/5

5 Reasonable steps must be taken to ensure the security of personal, health or sensitive information against loss, unauthorised access, modification or other misuse. It is the responsibility of all users to understand and comply with the Privacy Principles within each Act and the State Library s Privacy Management Plan. 8. Recordkeeping The State Library is required to comply with the State Records Act 1998 including Standards and Disposal Authorities issued under the Act. Corporate records, and the information they contain, must be protected appropriately according to their importance and sensitivity. Corporate records created or received on your device must be registered in the recordkeeping system TRIM. It is the responsibility of all users to understand and comply with the State Library s Records Management Policy, Electronic Document Management Policy, Policy and associated procedures. 9. BYOD Policy Breaches Compliance or policy breaches are to be reported to the Director, Digital Library Services and CIO in the first instance for assessment and appropriate action, which may include suspension or termination of access. Appeals to any suspension or termination of access decision may be lodged in writing to the NSW State Librarian and Chief Executive for review and consideration. The Director, Digital Library Services and CIO will report serious breaches requiring suspension or termination of access to the Executive Committees. 10. Approval This policy was approved by the Executive Committee on 07 October Implementation This policy is implemented on 31 October History N/A 13. Prepared by: Manager, ICT Services, Digital Library Services 30 September Document History and Version Control Version Date approved Approved by Brief description October 2014 Executive First Release Bring Your Own Device.docx 5/5

Mobile Devices Policy

Mobile Devices Policy Mobile Devices Policy Item Policy description Division Director Contact Description Guidelines to ensure that mobile devices are deployed and used in a secure and appropriate manner. IT Services and Records

More information

NSW Government. Wireless services (WiFi) Standard

NSW Government. Wireless services (WiFi) Standard NSW Government Wireless services (WiFi) Standard May 2014 CONTENTS 1. CONTEXT 2 1.1. Background 2 1.2. Purpose 2 1.3. Scope and application 2 2. STANDARDS GOVERNANCE 2 2.1. Standards to support the ICT

More information

Security Systems Surveillance Policy

Security Systems Surveillance Policy Security Systems Surveillance Policy Version: 1.0 Last Amendment: Approved by: Executive Policy owner/sponsor: Director, Operations and CFO Policy Contact Officer: Manager, Facilities & Security Policy

More information

NSW Government. End User Computing Standard. Version 1.0. October 2014

NSW Government. End User Computing Standard. Version 1.0. October 2014 NSW Government End User Computing Standard Version 1.0 October 2014 [email protected] ICT Services Office of Finance & Services Level 23, McKell Building 2-24 Rawson Place SYDNEY NSW 2000 CONTENTS

More information

Highland Council Information Security Policy

Highland Council Information Security Policy Highland Council Information Security Policy Document Owner: Vicki Nairn, Head of Digital Transformation Page 1 of 16 Contents 1. Document Control... 4 Version History... 4 Document Authors... 4 Distribution...

More information

SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY

SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY OBJECTIVE To provide users with guidelines for the use of information technology resources provided by Council. SCOPE This policy

More information

Information Security Program

Information Security Program Stephen F. Austin State University Information Security Program Revised: September 2014 2014 Table of Contents Overview... 1 Introduction... 1 Purpose... 1 Authority... 2 Scope... 2 Information Security

More information

INFORMATION TECHNOLOGY SECURITY STANDARDS

INFORMATION TECHNOLOGY SECURITY STANDARDS INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL

More information

INFORMATION GOVERNANCE AND SECURITY 1 POLICY DRAFTED BY: INFORMATION GOVERNANCE LEAD 2 ACCOUNTABLE DIRECTOR: SENIOR INFORMATION RISK OWNER

INFORMATION GOVERNANCE AND SECURITY 1 POLICY DRAFTED BY: INFORMATION GOVERNANCE LEAD 2 ACCOUNTABLE DIRECTOR: SENIOR INFORMATION RISK OWNER INFORMATION GOVERNANCE AND SECURITY 1 POLICY DRAFTED BY: INFORMATION GOVERNANCE LEAD 2 ACCOUNTABLE DIRECTOR: SENIOR INFORMATION RISK OWNER 3 APPLIES TO: ALL STAFF 4 COMMITTEE & DATE APPROVED: AUDIT COMMITTEE

More information

Developing a Policy for Bring Your Own Device. Report to the Joint Legislative Oversight Committee on Information Technology

Developing a Policy for Bring Your Own Device. Report to the Joint Legislative Oversight Committee on Information Technology Developing a Policy for Bring Your Own Device Report to the Joint Legislative Oversight Committee on Information Technology Chris Estes State Chief Information Officer Office of Information Technology

More information

Bring Your Own Device Policy

Bring Your Own Device Policy Bring Your Own Device Policy Purpose of this Document This document describes acceptable use pertaining to using your own device whilst accessing University systems and services. This document will be

More information

Bring Your Own Device (BYOD) and Mobile Device Management. tekniqueit.com

Bring Your Own Device (BYOD) and Mobile Device Management. tekniqueit.com Bring Your Own Device (BYOD) and Mobile Device Management tekniqueit.com Bring Your Own Device (BYOD) and Mobile Device Management People are starting to expect the ability to connect to public networks

More information

Bring Your Own Device (BYOD) and Mobile Device Management. www.cognoscape.com

Bring Your Own Device (BYOD) and Mobile Device Management. www.cognoscape.com Bring Your Own Device (BYOD) and Mobile Device Management www.cognoscape.com Bring Your Own Device (BYOD) and Mobile Device Management People are starting to expect the ability to connect to public networks

More information

How To Protect Decd Information From Harm

How To Protect Decd Information From Harm Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the

More information

Information Security Policy

Information Security Policy Information Security Policy Author: Responsible Lead Executive Director: Endorsing Body: Governance or Assurance Committee Alan Ashforth Alan Lawrie ehealth Strategy Group Implementation Date: September

More information

Records and Document Management

Records and Document Management Records and Document Management Policy P3 Current: Updated November 2011 Table of Contents Purpose... 3 Scope... 3 Definitions... 3 Policy statement... 4 Responsibility... 4 Legislative context... 5 Associated

More information

University of Liverpool

University of Liverpool University of Liverpool Information Security Policy Reference Number Title CSD-003 Information Security Policy Version Number 3.0 Document Status Document Classification Active Open Effective Date 01 October

More information

RECORDS MANAGEMENT POLICY

RECORDS MANAGEMENT POLICY RECORDS MANAGEMENT POLICY POLICY STATEMENT The records of Legal Aid NSW are a major component of its corporate memory and risk management strategies. They are a vital asset that support ongoing operations

More information

CCG LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY

CCG LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY CCG LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY (for Cheshire CCGs) Version 3.2 Ratified By Date Ratified November 2014 Author(s) Responsible Committee / Officers Issue Date November 2014 Review

More information

Mobile Security Standard

Mobile Security Standard Mobile Security Standard Title Mobile Security Standard Mobile Device Security Category Version: 18/07/2013 PUBLISHED Author:, IT Services Contact: [email protected] Mobile Security Standard

More information

POLICY ON USE OF INTERNET AND EMAIL

POLICY ON USE OF INTERNET AND EMAIL POLICY ON USE OF INTERNET AND EMAIL OVERVIEW Public sector employees are accountable for their use and management of all public resources including the use of services such as the Internet and electronic

More information

How To Write A Mobile Device Policy

How To Write A Mobile Device Policy BYOD Policy Implementation Guide BYOD Three simple steps to legally secure and manage employee-owned devices within a corporate environment We won t bore you with the typical overview that speaks to the

More information

NSW Government. Cloud Services Policy and Guidelines

NSW Government. Cloud Services Policy and Guidelines NSW Government Cloud Services Policy and Guidelines August 2013 1 CONTENTS 1. Introduction 2 1.1 Policy statement 3 1.2 Purpose 3 1.3 Scope 3 1.4 Responsibility 3 2. Cloud services for NSW Government 4

More information

INFORMATION SECURITY PROCEDURES

INFORMATION SECURITY PROCEDURES INFORMATION AN INFORMATION SECURITY PROCEURES Parent Policy Title Information Security Policy Associated ocuments Use of Computer Facilities Statute 2009 Risk Management Policy Risk Management Procedures

More information

Bring Your Own Device (BYOD) and Mobile Device Management

Bring Your Own Device (BYOD) and Mobile Device Management Bring Your Own Device (BYOD) and Mobile Device Management Intivix.com (415) 543 1033 PROFESSIONAL IT SERVICES FOR BUSINESSES OF ALL SHAPES AND SIZES People are starting to expect the ability to connect

More information

Information Security Incident Management Policy September 2013

Information Security Incident Management Policy September 2013 Information Security Incident Management Policy September 2013 Approving authority: University Executive Consultation via: Secretary's Board REALISM Project Board Approval date: September 2013 Effective

More information

BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT

BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT www.intivix.com (415) 543 1033 HELP TEAM MEMBERS TO COLLABORATE MORE EASILY FROM ANYWHERE. People are starting to expect the ability to connect

More information

Issue 1.0. UoG/ILS/IS 001. Information Security and Assurance Policy. Information Security and Compliance Manager

Issue 1.0. UoG/ILS/IS 001. Information Security and Assurance Policy. Information Security and Compliance Manager Document Reference Number Date Title Author Owning Department Version Approval Date Review Date Approving Body UoG/ILS/IS 001 January 2016 Information Security and Assurance Policy Information Security

More information

COMPUTER USER REGULATIONS INFORMATION TECHNOLOGY POLICY 1

COMPUTER USER REGULATIONS INFORMATION TECHNOLOGY POLICY 1 COMPUTER USER REGULATIONS INFORMATION TECHNOLOGY POLICY 1 1. INTRODUCTION The purpose of this policy is to: I. Regulate access to Manukau Institute of Technology ( MIT ) Computer Systems ensuring they

More information

LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY

LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY Version 1.0 Ratified By Date Ratified Author(s) Responsible Committee / Officers Issue Date Review Date Intended Audience Impact Assessed CCG Committee

More information

NSW Government. Data Centre & Cloud Readiness Assessment Services Standard. v1.0. June 2015

NSW Government. Data Centre & Cloud Readiness Assessment Services Standard. v1.0. June 2015 NSW Government Data Centre & Cloud Readiness Assessment Services Standard v1.0 June 2015 ICT Services Office of Finance & Services McKell Building 2-24 Rawson Place SYDNEY NSW 2000 [email protected]

More information

Newcastle University Information Security Procedures Version 3

Newcastle University Information Security Procedures Version 3 Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations

More information

PS177 Remote Working Policy

PS177 Remote Working Policy PS177 Remote Working Policy January 2014 Version 2.0 Statement of Legislative Compliance This document has been drafted to comply with the general and specific duties in the Equality Act 2010; Data Protection

More information

Guideline for Roles & Responsibilities in Information Asset Management

Guideline for Roles & Responsibilities in Information Asset Management ISO 27001 Implementer s Forum Guideline for Roles & Responsibilities in Information Asset Management Document ID ISMS/GL/ 003 Classification Internal Use Only Version Number Initial Owner Issue Date 07-08-2009

More information

How To Ensure Network Security

How To Ensure Network Security NETWORK SECURITY POLICY Policy approved by: Assurance Committee Date: 3 December 2014 Next Review Date: December 2016 Version: 1.0 Page 1 of 12 Review and Amendment Log/Control Sheet Responsible Officer:

More information

Information Technology Services

Information Technology Services Responsible Officer Approved by Chief Information Officer Council Approved and commenced August, 2014 Review by August, 2017 Relevant Legislation, Ordinance, Rule and/or Governance Level Principle ICT

More information

YORK REGION DISTRICT SCHOOL BOARD

YORK REGION DISTRICT SCHOOL BOARD WORKING DOCUMENT YORK REGION DISTRICT SCHOOL BOARD Policy and Procedure #194.0, Use of Technology Procedure #194.1, Use of Non-Board Devices Procedure #194.2, Password Management The Use of Technology

More information

Boston Public Schools. Guidelines for Implementation of Acceptable Use Policy for Digital Information, Communication, and. Technology Resources

Boston Public Schools. Guidelines for Implementation of Acceptable Use Policy for Digital Information, Communication, and. Technology Resources Boston Public Schools Guidelines for Implementation of Acceptable Use Policy for Digital Information, Communication, and Scope of Policy Technology Resources ACCEPTABLE USE POLICY AND GUIDELINES Boston

More information

Information & ICT Security Policy Framework

Information & ICT Security Policy Framework Information & ICT Security Framework Version: 1.1 Date: September 2012 Unclassified Version Control Date Version Comments November 2011 1.0 First draft for comments to IT & Regulation Group and IMG January

More information

NSW Government. Mobile Device & Application Framework. Version 1.0

NSW Government. Mobile Device & Application Framework. Version 1.0 NSW Government Mobile Device & Application Framework Version 1.0 [email protected] ICT Services Office of Finance & Services McKell Building 2-24 Rawson Place SYDNEY NSW 2000 CONTENTS 1. CONTEXT

More information

Corporate Information Security Management Policy

Corporate Information Security Management Policy Corporate Information Security Management Policy Signed: Chief Executive. 1. Definition of Information Security 1.1. Information security means safeguarding information from unauthorised access or modification

More information

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4

More information

Clevertar Privacy Policy

Clevertar Privacy Policy Clevertar Privacy Policy At Clevertar, we take privacy very seriously. We encourage you to read this Privacy Policy Policy carefully. The defined terms in this Policy have the same meaning as in our Terms

More information

Service Schedule for CLOUD SERVICES

Service Schedule for CLOUD SERVICES Service Schedule for CLOUD SERVICES This Service Schedule is effective for Cloud Services provided on or after 1 September 2013. Terms and Conditions applicable to Cloud Services provided prior to this

More information

Access Control Policy

Access Control Policy Version 3.0 This policy maybe updated at anytime (without notice) to ensure changes to the HSE s organisation structure and/or business practices are properly reflected in the policy. Please ensure you

More information

DOT.Comm Oversight Committee Policy

DOT.Comm Oversight Committee Policy DOT.Comm Oversight Committee Policy Enterprise Computing Software Policy Service Owner: DOTComm Operations Effective Date: TBD Review Schedule: Annual Last Review Date: Last Revision Date: Approved by:

More information

How To Understand The Bring Your Own Device To School Policy At A School

How To Understand The Bring Your Own Device To School Policy At A School The Thomas Hardye School Bring Your Own Device to School (BYOD) Policy for Students Adopted by Personnel & Resources Committee 1 st September 2014 Review date: 31 st August 2015 Signed by Chair:. CONTENTS

More information

Draft Information Technology Policy

Draft Information Technology Policy Draft Information Technology Policy Version 3.0 Draft Date June 2014 Status Draft Approved By: Table of Contents 1.0 Introduction... 6 Background... 6 Purpose... 6 Scope... 6 Legal Framework... 6 2.0 Software

More information

Network Security Policy

Network Security Policy Department / Service: IM&T Originator: Ian McGregor Deputy Director of ICT Accountable Director: Jonathan Rex Interim Director of ICT Approved by: County and Organisation IG Steering Groups and their relevant

More information

ICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation

ICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation ICT SECURITY POLICY Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation Responsibility Assistant Principal, Learner Services Jannette

More information

Don t Let A Security Breach Put You Out of Business

Don t Let A Security Breach Put You Out of Business Don t Let A Security Breach Put You Out of Business Committed to providing you with the most innovative security and privacy solutions. www.boomtechit.com Bring Your Own Device (BYOD) and Mobile Device

More information

Choose Your Own Device (CYOD) and Mobile Device Management. gsolutionz.com

Choose Your Own Device (CYOD) and Mobile Device Management. gsolutionz.com Choose Your Own Device (CYOD) and Mobile Device Management gsolutionz.com Choose Your Own Device (CYOD) and Mobile Device Management 2 gsolutionz.com People are starting to expect the ability to connect

More information

Records Management Policy & Procedure

Records Management Policy & Procedure Records Management Policy & Procedure 1. Purpose This document is in addition to and supports the Department of Attorney General and Justice Records Management Policy and Procedures and ensures compliance

More information

COUNCIL POLICY R180 RECORDS MANAGEMENT

COUNCIL POLICY R180 RECORDS MANAGEMENT 1. Scope The City of Mount Gambier Records Management Policy provides the policy framework for Council to effectively fulfil its obligations and statutory requirements under the State Records Act 1997.

More information

Data Protection Act 1998. Bring your own device (BYOD)

Data Protection Act 1998. Bring your own device (BYOD) Data Protection Act 1998 Bring your own device (BYOD) Contents Introduction... 3 Overview... 3 What the DPA says... 3 What is BYOD?... 4 What are the risks?... 4 What are the benefits?... 5 What to consider?...

More information

COMPUTER USAGE - EMAIL

COMPUTER USAGE - EMAIL BASIC BELIEF This policy relates to the use of staff email at Mater Dei and is designed to provide guidelines for individual staff regarding their use. It encourages users to make responsible choices when

More information

Encryption Policy Version 3.0

Encryption Policy Version 3.0 Version 3.0 This policy maybe updated at anytime (without notice) to ensure changes to the HSE s organisation structure and/or business practices are properly reflected in the policy. Please ensure you

More information

B. Privacy. Users have no expectation of privacy in their use of the CPS Network and Computer Resources.

B. Privacy. Users have no expectation of privacy in their use of the CPS Network and Computer Resources. Chicago Public Schools Policy Manual Title: ACCEPTABLE USE OF THE CPS NETWORK AND COMPUTER RESOURCES Section: 604.1 Board Report: 09-0722-PO3 Date Adopted: July 22, 2009 Policy: THE CHIEF EXECUTIVE OFFICER

More information

SERVER, DESKTOP AND PORTABLE SECURITY. September 2014. Version 3.0

SERVER, DESKTOP AND PORTABLE SECURITY. September 2014. Version 3.0 SERVER, DESKTOP AND PORTABLE SECURITY September 2014 Version 3.0 Western Health and Social Care Trust Page 1 of 6 Server, Desktop and Portable Policy Title SERVER, DESKTOP AND PORTABLE SECURITY POLICY

More information

School of Anthropology and Museum Ethnography & School of Interdisciplinary Area Studies Information Security Policy

School of Anthropology and Museum Ethnography & School of Interdisciplinary Area Studies Information Security Policy School of Anthropology and Museum Ethnography & School of Interdisciplinary Area Studies Information Security Policy Page 1 of 10 Contents 1 Preamble...3 2 Purpose...3 3 Scope...3 4 Roles and responsibilities...3

More information

Information Management and Security Policy

Information Management and Security Policy Unclassified Policy BG-Policy-03 Contents 1.0 BG Group Policy 3 2.0 Policy rationale 3 3.0 Applicability 3 4.0 Policy implementation 4 Document and version control Version Author Issue date Revision detail

More information

INFORMATION SECURITY POLICY

INFORMATION SECURITY POLICY INFORMATION SECURITY POLICY Policy approved by: Audit and Governance Committee Date: 4 th December 2014 Next Review Date: December 2016 Version: 1 Information Security Policy Page 1 of 17 Review and Amendment

More information

ICT budget and staffing trends in the UK

ICT budget and staffing trends in the UK ICT budget and staffing trends in the UK Enterprise ICT investment plans to 2013 January 2013 TABLE OF CONTENTS 1 Trends in ICT budgets... 1 1.1 Introduction... 1 1.2 Survey demographics... 1 1.3 IT budget

More information

Document Control. Version Control. Sunbeam House Services Policy Document. Data Breach Management Policy. Effective Date: 01 October 2014

Document Control. Version Control. Sunbeam House Services Policy Document. Data Breach Management Policy. Effective Date: 01 October 2014 Document Control Policy Title Data Breach Management Policy Policy Number 086 Owner Information & Communication Technology Manager Contributors Information & Communication Technology Team Version 1.0 Date

More information

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c

INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c INFORMATION SECURITY MANAGEMENT SYSTEM Version 1c Revised April 2011 CONTENTS Introduction... 5 1 Security Policy... 7 1.1 Information Security Policy... 7 1.2 Scope 2 Security Organisation... 8 2.1 Information

More information

ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY

ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 1.0 Ratified By Date Ratified Author(s) Responsible Committee / Officers Issue Date Review Date Intended Audience Impact Assessed CCG Committee

More information

Cyber Security. John Leek Chief Strategist

Cyber Security. John Leek Chief Strategist Cyber Security John Leek Chief Strategist AGENDA The Changing Business Landscape Acknowledge cybersecurity as an enterprise-wide risk management issue not just an IT issue How to develop a cybersecurity

More information

BYOD. Bring Your Own Device - Mobile Device Management. www.prooncall.com

BYOD. Bring Your Own Device - Mobile Device Management. www.prooncall.com BYOD Bring Your Own Device - Mobile Device Management www.prooncall.com Bring Your Own Device (BYOD) Mobile Device Management People are starting to expect the ability to connect to public networks and

More information

Data Governance. Policy FINAL (Approved)

Data Governance. Policy FINAL (Approved) Data Governance Policy FINAL (Approved) July 2010 DOCUMENT CONTROL Document Title: Data Governance Policy Summary: This document defines the policies of the Cancer Institute NSW regarding our data governance

More information

Type of Personal Data We Collect and How We Use It

Type of Personal Data We Collect and How We Use It Philips Lumify App Privacy Notice This Privacy Notice was last changed on September 1, 2015. Philips Electronics North America Corporation ("Philips") strongly believes in protecting the privacy of the

More information

IT TECHNOLOGY ACCESS POLICY

IT TECHNOLOGY ACCESS POLICY IT TECHNOLOGY ACCESS POLICY Effective Date May 19, 2016 Cross- Reference 1. IT Access Control and User Access Management Policy Responsibility Director, Information 2. IT Acceptable Use Policy Technology

More information

amaysim Privacy Policy

amaysim Privacy Policy amaysim Privacy Policy Valid as of 07 October 2015-1 of 8 - amaysim Australia Pty Ltd ABN 65 143 613 478 (referred to in this document as amaysim or we or us ). 1. Protection of your privacy and personal

More information

Intel Enhanced Data Security Assessment Form

Intel Enhanced Data Security Assessment Form Intel Enhanced Data Security Assessment Form Supplier Name: Address: Respondent Name & Role: Signature of responsible party: Role: By placing my name in the box above I am acknowledging that I am authorized

More information

CJIS SECURITY POLICY: VERSION 5.2 CHANGES AND THE UPCOMING REQUIREMENTS.

CJIS SECURITY POLICY: VERSION 5.2 CHANGES AND THE UPCOMING REQUIREMENTS. CJIS SECURITY POLICY: VERSION 5.2 CHANGES AND THE UPCOMING REQUIREMENTS. Alan Ferretti CJIS Information Security Officer Texas Department of Public Safety CJIS Security Policy version 5.2: On 8/9/2013

More information

St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy

St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy Learn, sparkle & shine St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy Adopted from the LA Policy April 2015 CONTENTS Page No 1. Introduction 1 2. Guiding Principles

More information

Information Technology and Communications Policy

Information Technology and Communications Policy Information Technology and Communications Policy No: FIN-IT-POL-001 Version: 03 Issue Date: 10.06.13 Review Date: 10.06.16 Author: Robert Cooper Monitor Changes Approved by: Board of Governors Version

More information